Security Guidelines

When submitting content to Conflict Minnesota, and even when just browsing, it is highly recommended you use the Tor browser which you can download for free here. Tor prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. You can also use Tails, a Debian-based operating system that runs all internet traffic through Tor.

When submitting images, make sure to erase any metadata that may be attached to the image. This could include location, date and time, details about the camera and more. It is also a good idea to slightly crop the photo so that the dimensions do not match up to your camera’s aspect ratio. Conflict will make sure to erase metadata before publishing, but it is safer to do so before the images are transmitted over the internet at all.

Tech security is only one part of staying secure. Online anonymity doesn’t mean anything if you take credit for something either on social media or in face to face conversations. Be careful what you share (online and off) that could be used to connect you or others to anything you or they would rather not be.